cybersecsi / houdini
Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.
β1,234Updated last year
Alternatives and similar repositories for houdini:
Users that are interested in houdini are comparing it to the libraries listed below
- A repo to automatically generate and keep updated a series of Docker images through GitHub Actions.β550Updated this week
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!β2,095Updated 5 months ago
- π A curated list of awesome Docker security resourcesβ667Updated 5 months ago
- β569Updated 2 years ago
- Automating situational awareness for cloud penetration tests.β2,081Updated last month
- My cheatsheet notes to pentest AWS infrastructureβ673Updated 2 years ago
- π‘οΈ Awesome Cloud Security Resources βοΈβ2,159Updated 5 months ago
- A Microservices-based framework for the study of Network Security and Penetration Test techniquesβ593Updated 6 months ago
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.β2,051Updated 9 months ago
- Granular, Actionable Adversary Emulation for the Cloudβ1,989Updated this week
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)β1,300Updated 2 months ago
- A curated list of awesome CI CD security resourcesβ540Updated 5 months ago
- Code Scanning/SAST/Static Analysis/Linting using many tools/Scanners with One Report (Code, IaC) - Betterscanβ859Updated last month
- A Blazing fast Security Auditing tool for Kubernetesβ995Updated last year
- Dangerously fast DNS/network/port scannerβ900Updated 3 years ago
- DNSTake β A fast tool to check missing hosted DNS zones that can lead to subdomain takeoverβ839Updated 2 years ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!β1,884Updated last year
- API Security Project aims to present unique attack & defense methods in API Security fieldβ1,381Updated last year
- Awesome cloud enumeratorβ1,000Updated last month
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, β¦β959Updated last year
- vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.β1,228Updated 3 months ago
- Run popular commandline tools within dockerβ1,266Updated last year
- Automated Red Team Infrastructure deployement using Dockerβ1,236Updated 2 years ago
- Checklist for container security - devsecops practicesβ1,560Updated last year
- AWSGoat : A Damn Vulnerable AWS Infrastructureβ1,833Updated 2 months ago
- Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the tβ¦β744Updated 3 years ago
- a drop-in replacement for Nmap powered by shodan.ioβ3,003Updated 2 months ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.β1,368Updated 3 weeks ago
- Automated pentest reporting with custom Word templates, project tracking, and client management tools. Streamline your security workflowsβ¦β961Updated last week
- A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.β399Updated 4 months ago